From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by lists.proxmox.com (Postfix) with ESMTPS id 293E49CB26 for ; Thu, 1 Jun 2023 10:34:42 +0200 (CEST) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id 09E7F1B896 for ; Thu, 1 Jun 2023 10:34:42 +0200 (CEST) Received: from proxmox-new.maurer-it.com (proxmox-new.maurer-it.com [94.136.29.106]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by firstgate.proxmox.com (Proxmox) with ESMTPS for ; Thu, 1 Jun 2023 10:34:40 +0200 (CEST) Received: from proxmox-new.maurer-it.com (localhost.localdomain [127.0.0.1]) by proxmox-new.maurer-it.com (Proxmox) with ESMTP id 8D2CD480AA; Thu, 1 Jun 2023 10:34:40 +0200 (CEST) Message-ID: Date: Thu, 1 Jun 2023 10:34:36 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.11.0 To: "DERUMIER, Alexandre" , "pve-devel@lists.proxmox.com" , "aderumier@odiso.com" References: <20230522102528.186955-1-aderumier@odiso.com> <5ee559732b6d5d1d26462cc7d824cc159b13d3de.camel@groupe-cyllene.com> Content-Language: en-US From: Fiona Ebner In-Reply-To: <5ee559732b6d5d1d26462cc7d824cc159b13d3de.camel@groupe-cyllene.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-SPAM-LEVEL: Spam detection results: 0 AWL -0.003 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% DMARC_MISSING 0.1 Missing DMARC policy KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment NICE_REPLY_A -0.091 Looks like a legit reply (A) SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record T_SCC_BODY_TEXT_LINE -0.01 - Subject: Re: [pve-devel] [PATCH-SERIES v3 qemu-server/manager/common] add and set x86-64-v2 as default model for new vms and detect best cpumodel X-BeenThere: pve-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox VE development discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 01 Jun 2023 08:34:42 -0000 Am 31.05.23 um 16:34 schrieb DERUMIER, Alexandre: > Le mercredi 31 mai 2023 à 13:36 +0200, Fiona Ebner a écrit : >> Am 22.05.23 um 12:25 schrieb Alexandre Derumier: >>> In addition to theses model, I have enabled aes too. >>> I think it's really important, because a lot of users use default >>> values and have >>> bad performance with ssl and other crypto stuffs. >>> >> >> So there is the answer to my aes question :) But shouldn't we rather >> set >> it via the UI as a default than change the CPU definition itself? >> That >> feels cleaner as we'd not diverge from how they defined the ABI. > > I don't have looked pve-manager code yet, but do you think it's easy > to auto enable/disable the aes flag in the grid when we choose theses > models ? I also haven't looked at the code, but yeah, it is an issue that it's in the advanced part and we shouldn't hide it from the user that it's on. > Maybe could it be better to have 2 differents models, with/without aes > (like some qemu models versions like -IBRS, > here we could have > > x86-64-v2 > x86-64-v2-aes (default) > x86-64-v3 > x86-64-v3-aes That might work, but if we do that, please only in the UI. Also not ideal, because how would interaction with the flag in the grid work? E.g. don't show it, force it on if an -aes model is selected? Maybe the easiest would be to extract the aes flag out of the grid into the non-advanced part?